Download Now Free registration required
Sensor networks may be used in many monitoring applications where the locations of the monitored objects are quite sensitive and need to be protected. Previous research mainly focuses on protecting source location against mote-class attackers who only have a local view of the network traffic. In this paper, the authors focus on how to protect the source location against laptop-class attackers who have a global view of the network traffic. This paper proposes four schemes - naive, global, greedy, and probabilistic - to deal with laptop-class attacks. The naive solution uses maintenance messages sent periodically to hide real event reports.
- Format: PDF
- Size: 220.47 KB